메뉴 건너뛰기




Volumn 6, Issue 1, 2013, Pages 61-74

Practical authentication scheme for SIP

Author keywords

Authentication; Elliptic curve; Password; SIP; VoIP

Indexed keywords

AUTHENTICATION; DATA PRIVACY; GEOMETRY; HYPERTEXT SYSTEMS; INTERNET TELEPHONY; PUBLIC KEY CRYPTOGRAPHY; SYSTEM-IN-PACKAGE; VOICE/DATA COMMUNICATION SYSTEMS;

EID: 84872342509     PISSN: 19366442     EISSN: 19366450     Source Type: Journal    
DOI: 10.1007/s12083-012-0129-7     Document Type: Article
Times cited : (14)

References (36)
  • 1
    • 0003240332 scopus 로고    scopus 로고
    • SIP: Session Initiation Protocol
    • Rosenberg J et al (2002) SIP: Session Initiation Protocol. IETF RFC 3261.
    • (2002) IETF RFC 3261
    • Rosenberg, J.1
  • 2
    • 0003288971 scopus 로고    scopus 로고
    • SIP: Session Initiation Protocol
    • Handley M et al (1999) SIP: Session Initiation Protocol. IETF RFC 2543.
    • (1999) IETF RFC 2543
    • Handley, M.1
  • 3
    • 84872342828 scopus 로고
    • ITU-T Recommendation Q. 700: Introduction to CCITT Signalling System 7
    • International Telecommunications Union
    • International Telecommunications Union (1993) ITU-T Recommendation Q. 700: Introduction to CCITT Signalling System 7. Recommendation Q. 700. International Telecommunications Union.
    • (1993) Recommendation Q. 700. International Telecommunications Union
  • 4
    • 0003365506 scopus 로고    scopus 로고
    • HTTP authentication: basic and digest access authentication
    • Franks J et al (1999) HTTP authentication: basic and digest access authentication. IETF RFC 2617.
    • (1999) IETF RFC 2617
    • Franks, J.1
  • 5
    • 0036870280 scopus 로고    scopus 로고
    • SIP security issues: the SIP authentication procedure and its processing load
    • Stefano S et al (2002) SIP security issues: the SIP authentication procedure and its processing load. IEEE Network 16(16): 38-44.
    • (2002) IEEE Network , vol.16 , Issue.16 , pp. 38-44
    • Stefano, S.1
  • 7
    • 33750013256 scopus 로고    scopus 로고
    • Denial of service attacks targeting a SIP VoIP infrastructure: stack scenarios and prevention mechanisms
    • Sisalemd D, Kuthan J, Ehlerts S (2006) Denial of service attacks targeting a SIP VoIP infrastructure: stack scenarios and prevention mechanisms. IEEE Network 20(5): 26-31.
    • (2006) IEEE Network , vol.20 , Issue.5 , pp. 26-31
    • Sisalemd, D.1    Kuthan, J.2    Ehlerts, S.3
  • 9
    • 77955431593 scopus 로고    scopus 로고
    • A Secure and efficient SIP authentication scheme for converged VoIP networks
    • Yoon E, Yoo K, Kim C, Hong Y, Jo M, Chen H (2010) A Secure and efficient SIP authentication scheme for converged VoIP networks. Comput Commun 33(14): 1674-1681.
    • (2010) Comput Commun , vol.33 , Issue.14 , pp. 1674-1681
    • Yoon, E.1    Yoo, K.2    Kim, C.3    Hong, Y.4    Jo, M.5    Chen, H.6
  • 11
    • 24344457092 scopus 로고    scopus 로고
    • Secure authentication scheme for session initiation protocol
    • Yang C et al (2005) Secure authentication scheme for session initiation protocol. Comput Secur 24: 381-386.
    • (2005) Comput Secur , vol.24 , pp. 381-386
    • Yang, C.1
  • 12
    • 44549088249 scopus 로고    scopus 로고
    • A new authentication mechanism and key agreement protocol for SIP using identity-based cryptography
    • Ring J, Choo K, Foo E, Looi M (2006) A new authentication mechanism and key agreement protocol for SIP using identity-based cryptography. Proc AusCert R& D Stream pp 61-72.
    • (2006) Proc AusCert R& D Stream , pp. 61-72
    • Ring, J.1    Choo, K.2    Foo, E.3    Looi, M.4
  • 13
    • 44549086712 scopus 로고    scopus 로고
    • A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography
    • Wang F, Zhang Y (2008) A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography. Comput Commun 31: 2142-2149.
    • (2008) Comput Commun , vol.31 , pp. 2142-2149
    • Wang, F.1    Zhang, Y.2
  • 14
    • 63149153148 scopus 로고    scopus 로고
    • A lightweight protection mechanism against signaling attacks in a SIP-Based VoIP environment
    • Dimitris G, Costas L (2007) A lightweight protection mechanism against signaling attacks in a SIP-Based VoIP environment. Telecommun Syst 36(4): 153-159.
    • (2007) Telecommun Syst , vol.36 , Issue.4 , pp. 153-159
    • Dimitris, G.1    Costas, L.2
  • 15
    • 55749113850 scopus 로고    scopus 로고
    • A new provably secure authentication and key agreement protocol for SIP using ECC
    • Wu L et al (2009) A new provably secure authentication and key agreement protocol for SIP using ECC. Comp Stand Inter 31(2): 286-291.
    • (2009) Comp Stand Inter , vol.31 , Issue.2 , pp. 286-291
    • Wu, L.1
  • 16
    • 74149091306 scopus 로고    scopus 로고
    • A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves
    • Liao Y, Wang S (2010) A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves. Comput Commun 33(3): 372-380.
    • (2010) Comput Commun , vol.33 , Issue.3 , pp. 372-380
    • Liao, Y.1    Wang, S.2
  • 17
    • 77952524229 scopus 로고    scopus 로고
    • Robust mutual authentication with a key agreement scheme for the session initiation protocol
    • Yoon E, Shin Y, Jeon I, Yoo K (2010) Robust mutual authentication with a key agreement scheme for the session initiation protocol. IETE Techn Rev 27(3): 203-213.
    • (2010) IETE Techn Rev , vol.27 , Issue.3 , pp. 203-213
    • Yoon, E.1    Shin, Y.2    Jeon, I.3    Yoo, K.4
  • 18
    • 84855301449 scopus 로고    scopus 로고
    • A new authenticated key agreement for session initiation protocol
    • doi:10.1002/dac.1286
    • Xie Q (2011) A new authenticated key agreement for session initiation protocol. Int J Commun Syst 25(1): 47-54. doi: 10. 1002/dac. 1286.
    • (2011) Int J Commun Syst. , vol.25 , Issue.1 , pp. 6-13
    • Xie, Q.1
  • 19
    • 54349125537 scopus 로고    scopus 로고
    • A remote user authentication scheme without using smart cards
    • Rhee et al (2009) A remote user authentication scheme without using smart cards. Comp Stand Inter 31: 6-13.
    • (2009) Comp Stand Inter , vol.31 , pp. 6-13
    • Rhee1
  • 20
    • 85020598353 scopus 로고
    • Identity-based cryptosystem and signature schemes
    • Shamir A (1984) Identity-based cryptosystem and signature schemes. In: Proc. Crypto 1984. LCNS, vol 196, pp 47-53.
    • (1984) Proc. Crypto 1984. LCNS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 22
    • 0002493959 scopus 로고
    • Self-certified public keys
    • Girault M (1991) Self-certified public keys. In: Proc. Eurocrypt'91, pp 491-497.
    • (1991) Proc. Eurocrypt'91 , pp. 491-497
    • Girault, M.1
  • 24
    • 84958760024 scopus 로고    scopus 로고
    • Elliptic curve based password authenticated key exchange protocols
    • Boyd C, Montague P, Nguyen K (2001) Elliptic curve based password authenticated key exchange protocols. In: Proc. ACISP 2001, pp 487-501.
    • (2001) Proc. ACISP 2001 , pp. 487-501
    • Boyd, C.1    Montague, P.2    Nguyen, K.3
  • 26
    • 0000112683 scopus 로고
    • Elliptic curve cryptosystem
    • Koblitz N (1987) Elliptic curve cryptosystem. Math Comp 48: 203-209.
    • (1987) Math Comp , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 27
    • 33751060286 scopus 로고    scopus 로고
    • A lightweight scheme for securely and reliably locating SIP users
    • Kong L et al (2006) A lightweight scheme for securely and reliably locating SIP users. In Proc. IEEE workshop VoIP management and security: 9-17.
    • (2006) Proc. IEEE workshop VoIP management and security , pp. 9-17
    • Kong, L.1
  • 30
    • 35048866891 scopus 로고    scopus 로고
    • New security results on encrypted key exchange
    • Springer
    • Bresson E, Chevassut O, Pointcheval D (2004) New security results on encrypted key exchange. In: Proc. PKC 2004. LNCS vol 2947. Springer, pp 145-158.
    • (2004) Proc. PKC 2004. LNCS , vol.2947 , pp. 145-158
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 31
    • 26444476977 scopus 로고    scopus 로고
    • Interactive Diffie-Hellman assumptions with applications to password-based authentication
    • Abdalla M, Pointcheval D (2005) Interactive Diffie-Hellman assumptions with applications to password-based authentication. In: Proc. FC'2005, pp 341-356.
    • (2005) Proc. FC'2005 , pp. 341-356
    • Abdalla, M.1    Pointcheval, D.2
  • 32
    • 33646805409 scopus 로고    scopus 로고
    • Examining indistinguishability-based proof models for key establishment protocols
    • Choo K, Boyd C, Hitchcock Y (2005) Examining indistinguishability-based proof models for key establishment protocols. In: Proc. ASIACRYPT'2005, pp 585-604.
    • (2005) Proc. ASIACRYPT'2005 , pp. 585-604
    • Choo, K.1    Boyd, C.2    Hitchcock, Y.3
  • 33
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Bellare M, Pointcheval D, Rogaway P (2000) Authenticated key exchange secure against dictionary attacks. In: Proc. EUROCRYPT'2000, pp 139-155.
    • (2000) Proc. EUROCRYPT'2000 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 34
    • 84937579774 scopus 로고    scopus 로고
    • The oracle Diffie-Hellman assumptions and an analysis of DHIES
    • Abdalla M, Bellare M, Rogaway P (2001) The oracle Diffie-Hellman assumptions and an analysis of DHIES. In: Proc. CT-RSA'2001, pp 143-158.
    • (2001) Proc. CT-RSA'2001 , pp. 143-158
    • Abdalla, M.1    Bellare, M.2    Rogaway, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.